ADTs illustrate the principle of ____.
A. information hiding
B. privacy
C. encapsulation
D. overloading
Answer: A
Computer Science & Information Technology
You might also like to view...
One common vulnerability exploitation method is a_______, in which a program is overwhelmed by an input of more data than it has allocated space for.
a) buffer overflow. b) memory flood. c) buffer flood. d) None of the above
Computer Science & Information Technology
What types of filters can be used to search for packages?
What will be an ideal response?
Computer Science & Information Technology